Twitter | Pretraživanje | |
antic0de
Network Intrusion Specialist
3.040
Tweetovi
381
Pratim
10.044
Osobe koje vas prate
Tweetovi
antic0de proslijedio/la je tweet
antic0de 1. velj
The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.
Reply Retweet Označi sa "sviđa mi se"
antic0de 1. velj
Odgovor korisniku/ci @insomniasec @anticode i 2 ostali
Yes there will be a few of us there. Look for the shirt and come and say hi. and will be in attendance with welcome packs.
Reply Retweet Označi sa "sviđa mi se"
antic0de 1. velj
The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Unsolicited Dog Pics 31. sij
Odgovor korisniku/ci @gabsmashh @metasploit
is hiring.... Come hack the planet with us!
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Nicolas Krassas 30. sij
PHP 7.0-7.4 disable_functions bypass 0day PoC
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Federico Muttis 30. sij
We are looking for security people at Okta. Remote OK for most EU/US cities. It's awesome. Ping me!
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Cesar Cerrudo 28. sij
New paper: “LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems, How to Detect and Prevent Them”
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
BSidesCanberra 28. sij
"Discovery and exploitation of Windows host-based vulnerabilities" - by
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Swissky 26. sij
Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Silvio Cesare 26. sij
Come join me and for “Linux Heap Exploitation” - a 4-day training at Singapore
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Dino A. Dai Zovi 26. sij
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
egyp7. 22. sij
TIL 7-zip can mount a VMDK.
Reply Retweet Označi sa "sviđa mi se"
antic0de 22. sij
Odgovor korisniku/ci @steventseeley @NattiSamson i 2 ostali
Nice one guys!
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Piotr Bania 22. sij
Has anyone managed to dump the T2 chip firmware from apple macbook so far? (not asking for actual dump just asking whether this was done before) (cc: )
Reply Retweet Označi sa "sviđa mi se"
antic0de 22. sij
Odgovor korisniku/ci @halvarflake
talk coming soon?
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
Matt Miller 21. sij
Here's your chance to hear tell the story of MS08-067 and finding exploits in crash reports :) And in case you missed the blog post he published a while ago:
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
IOActive, Inc 21. sij
If you're going to The Things Conference in Amsterdam, be sure to catch Cesar Cerrudo, CTO at IOActive, and his keynote session "LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems and How to Detect Them" on January 30th.
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
SocMed Ops 15. sij
This is good by NZ Police. Should’ve happened earlier in fact.
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
GNU/JUSTIN 15. sij
Do Stack Buffer Overflow Good has been updated with notes on Python 3. Learn yourself some basic stack smashing goodness on Windows!
Reply Retweet Označi sa "sviđa mi se"
antic0de proslijedio/la je tweet
ϻг_ϻε 14. sij
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:
Reply Retweet Označi sa "sviđa mi se"